VYPR
Low severity3.5NVD Advisory· Published Sep 25, 2025· Updated Apr 15, 2026

CVE-2025-10943

CVE-2025-10943

Description

A security flaw has been discovered in MikeCen WeChat-Face-Recognition up to 6e3f72bf8547d80b59e330f1137e4aa505f492c1. This vulnerability affects the function valid of the file wx.php. The manipulation of the argument echostr results in cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in MikeCen WeChat-Face-Recognition's wx.php allows remote attackers to inject arbitrary JavaScript via the echostr parameter.

Vulnerability

Overview

The file wx.php in the MikeCen WeChat-Face-Recognition project up to commit 6e3f72bf8547d80b59e330f1137e4aa505f492c1 contains a reflected cross-site scripting (XSS) flaw in the valid function [1]. The echostr is a parameter commonly used in WeChat server configuration validation, and the application fails to sanitize or encode its value before reflecting it back to the user's browser. The product does not use versioning, so specific affected releases are not defined [1].

Attack

Vector

The attack can be launched remotely without authentication. An attacker crafts a malicious URL containing a JavaScript payload in the echostr parameter and tricks a victim into clicking the link. The server then reflects the payload in the HTTP response, executing it in the context of the victim's session with the application [1].

Impact

Successful exploitation allows an attacker can execute arbitrary JavaScript in the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. The CVSS v3 base score is 3.5 (Low), reflecting the need for user interaction and the limited scope of impact [1].

Mitigation

The vendor was contacted but did not respond, and no official patch has been released. Users should manually sanitize the echostr parameter in wx.php or implement a Web Application Firewall (WAF) rule to block malicious input. As the project appears unmaintained, migrating to an alternative solution is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.